Question No: 23 – (Topic 1)

You have compromised a Windows workstation using Metasploit and have injected the Meterpreter payload into the svchost process. After modifying some files to set up a persistent backdoor you realize that you will need to change the modified and access times of the files to ensure that the administrator can#39;t see the changes you made. Which

Meterpreter module would you need to load in order to do this?

Core

Priv

Stdapi

Browser

Answer: D

Question No: 24 – (Topic 1)

Which of the following is a method of gathering user names from a Linux system?

Question No: 25 – (Topic 1)

You#39;ve been asked to test a non-transparent proxy lo make sure it is working. After confirming the browser is correctly pointed at the proxy, you try to browse a web site. The browser indicates it is quot;loadingquot; but never displays any part the page. Checking the proxy, you see a valid request in the proxy from your browser. Checking the response to the proxy, you see the results displayed in the accompanying screenshot. Which of the following answers is the most likely reason the browser hasn#39;t displayed the page yet?

The proxy is likely hung and must be restarted.

The proxy is configured to trap responses.

The proxy is configured to trap requests.

The site you are trying to reach is currently down.

Answer: C

Question No: 26 – (Topic 1)

Which of the following describe the benefits to a pass-the-hash attack over traditional password cracking?

No triggering of IDS signatures from the attack privileges at the level of theacquired password hash and no corruption of the LSASS process.

No triggering of IDS signatures from the attack, no account lockout and use ofnative windows file and print sharing tools on the compromised system.

No account lockout, privileges at the level of the acquired password hash and useof native windows file and print Sharif tools on the compromised system.

No account lockout, use of native file and print sharing tools on the compromisedsystem and no corruption of the LSASS process.

Answer: D

Question No: 27 – (Topic 1)

You are performing a wireless penetration lest and are currently looking for rogue access

points in one of their large facilities. You need to select an antenna that you can setup in a building and monitor the area for several days to see if any access points are turned on during the duration of the test. What type of antenna will you be selecting for this task?

High gain and Omni-Directional

High gain and Directional

Low gain and Omni-Directional

Low gain and Directional

Answer: B

Question No: 28 – (Topic 1)

Which of the following best describes a server side exploit?

Attack on the physical machine

Attack of a service listening on a network port

Attack that escalates user privilege to root or administrator

Attack of a client application that retrieves content from the network

Answer: C

Question No: 29 – (Topic 1)

How can web server logs be leveraged to perform Cross-Site Scripting (XSSI?

Web logs containing XSS may execute shell scripts when opened In a GUI textbrowser

XSS attacks cause web logs to become unreadable and therefore are an effective DOS attack.

If web logs are viewed in a web-based console, log entries containing XSS mayexecute on the browser.

When web logs are viewed in a terminal. XSS can escape to the shell and executecommands.

Answer: C

Question No: 30 – (Topic 1)

Which Metasploit payload includes simple upload and download functionality for moving files to and from compromised systems?